Re: Report on preliminary decision on TLS 1.3 and client auth

Yoav Nir <ynir.ietf@gmail.com> Wed, 28 October 2015 11:39 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B8651B5221 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 28 Oct 2015 04:39:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.012
X-Spam-Level:
X-Spam-Status: No, score=-7.012 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xs3aQpAGYOcE for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Wed, 28 Oct 2015 04:39:11 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7875F1B521B for <httpbisa-archive-bis2Juki@lists.ietf.org>; Wed, 28 Oct 2015 04:39:11 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1ZrP1R-0001iG-Fn for ietf-http-wg-dist@listhub.w3.org; Wed, 28 Oct 2015 11:36:05 +0000
Resent-Date: Wed, 28 Oct 2015 11:36:05 +0000
Resent-Message-Id: <E1ZrP1R-0001iG-Fn@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <ynir.ietf@gmail.com>) id 1ZrP1O-0001gA-8d for ietf-http-wg@listhub.w3.org; Wed, 28 Oct 2015 11:36:02 +0000
Received: from mail-wm0-f53.google.com ([74.125.82.53]) by maggie.w3.org with esmtps (TLS1.2:RSA_ARCFOUR_SHA1:128) (Exim 4.80) (envelope-from <ynir.ietf@gmail.com>) id 1ZrP1M-00074n-GA for ietf-http-wg@w3.org; Wed, 28 Oct 2015 11:36:01 +0000
Received: by wmeg8 with SMTP id g8so6646085wme.1 for <ietf-http-wg@w3.org>; Wed, 28 Oct 2015 04:35:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=CsNJSQPwVdyM9Fm89NdytLC3xPmCo0oRZucyeQ0Z+0A=; b=y9rNCgVoRN593EbSf70QspAltYmmIjFIXK0+2REtlg/Sbsi8I+mjWU1oOT0DQGOAlg G6bcTHQCEAg+DSKalj4iy/6vDsNmYjY5BrJjKVaYCkQpKvCO/vccH9WuYXEFZ/BDlZ6d fUNVaU7KPK2HL+Yh1wcXkdnTM8fkRZ+fYLS3xJHIXrbZDdSMavRBtDiEeYK4FSD+Y2lb AixE7CD2MXKtU/WHCDADloBjp2L5+V6O710YjfKmaSFe3BARqytigTaqb1zuBRJBOieM 6taQUOMz1B/hfH8EFO+u+A+OvXG7b+Ejcio3Y5rqfZ2OKBJcxQbp0Gl07+DqJJ3tJGeN ydug==
X-Received: by 10.28.134.205 with SMTP id i196mr1133957wmd.17.1446032133496; Wed, 28 Oct 2015 04:35:33 -0700 (PDT)
Received: from [172.24.250.199] (dyn32-131.checkpoint.com. [194.29.32.131]) by smtp.gmail.com with ESMTPSA id t126sm4300387wmd.18.2015.10.28.04.35.32 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 28 Oct 2015 04:35:32 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.1 \(3096.5\))
From: Yoav Nir <ynir.ietf@gmail.com>
In-Reply-To: <CY1PR03MB13746A422A408890023C61D987230@CY1PR03MB1374.namprd03.prod.outlook.com>
Date: Wed, 28 Oct 2015 13:35:30 +0200
Cc: Martin Thomson <martin.thomson@gmail.com>, "Jason T. Greene" <jason.greene@redhat.com>, Ilari Liusvaara <ilariliusvaara@welho.com>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <7DF3664F-88D1-4A66-89B8-271D5B31D7EE@gmail.com>
References: <CABkgnnWREq6X+chcvookChGAZGxkJ6Zs_7FGwz7Mbn12XMxewQ@mail.gmail.com> <CABkgnnVeWXQ0KM+EuGrK6Nj6yuJKP6jGb51g2bN1+G_MHLcJig@mail.gmail.com> <20151020062455.GA476@LK-Perkele-V2.elisa-laajakaista.fi> <633F3373-BCB3-4985-ACE7-209F02A167B6@redhat.com> <CABkgnnVhYrodst7OMLGsyebLYXqF+S2qF+aaJiQx28xrAZ-a7w@mail.gmail.com> <A6CD7323-074D-49B0-934E-A64CE791CF39@gmail.com> <CY1PR03MB13746A422A408890023C61D987230@CY1PR03MB1374.namprd03.prod.outlook.com>
To: Mike Bishop <Michael.Bishop@microsoft.com>
X-Mailer: Apple Mail (2.3096.5)
Received-SPF: pass client-ip=74.125.82.53; envelope-from=ynir.ietf@gmail.com; helo=mail-wm0-f53.google.com
X-W3C-Hub-Spam-Status: No, score=-5.1
X-W3C-Hub-Spam-Report: AWL=-1.083, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001, W3C_AA=-1, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1ZrP1M-00074n-GA e39d11eb8d1d6f47dea28b45ca62415b
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Report on preliminary decision on TLS 1.3 and client auth
Archived-At: <http://www.w3.org/mid/7DF3664F-88D1-4A66-89B8-271D5B31D7EE@gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/30412
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

I’m not sure I follow. As you say, existing apps call the HTTP layer requesting the client cert. The HTTP layer does some magic, which could be a TLS 1.2 renegotiation, a TLS 1.3 Certificate Request, or a new HTTP authentication. Either way, the HTTP layer finally returns to the application with either a certificate or a lack thereof.

Both ways, the app does not need to change. That’s a good thing. Why would we need to change the APIs?

Yoav

> On 26 Oct 2015, at 8:00 PM, Mike Bishop <Michael.Bishop@microsoft.com> wrote:
> 
> Yes, the new thing would be "just" a new authentication mechanism, but the existing apps call down to the HTTP layer requesting the client cert, which asks TLS to either return or obtain the client cert.
> 
> As Martin has said, there's no opposition to a cert-based, or key-based, HTTP auth protocol being defined.  That's definitely something beneficial to the Internet that people could move toward in the future.  However, in the short term, we have applications which rely on the existing APIs and mechanisms -- the goal with this draft is simply as a compatibility measure.  Currently, those applications cannot use HTTP/2 over TLS 1.2 without one of the various hacks; in TLS 1.3, it will be less hacky.
> 
> You're arguing for a more idealized solution -- that's something I can get behind as a long-term direction, but we also have short-term issues that need a solution.  One does not preclude the other.
> 
> -----Original Message-----
> From: Yoav Nir [mailto:ynir.ietf@gmail.com] 
> Sent: Monday, October 26, 2015 12:03 AM
> To: Martin Thomson <martin.thomson@gmail.com>
> Cc: Jason T. Greene <jason.greene@redhat.com>; Ilari Liusvaara <ilariliusvaara@welho.com>; HTTP Working Group <ietf-http-wg@w3.org>
> Subject: Re: Report on preliminary decision on TLS 1.3 and client auth
> 
> 
>> On 20 Oct 2015, at 9:10 PM, Martin Thomson <martin.thomson@gmail.com> wrote:
>> 
>> On 20 October 2015 at 05:31, Jason T. Greene <jason.greene@redhat.com> wrote:
>>> Wouldn't the semantics be a hell of a lot cleaner, and implementations a lot simpler, if we just pushed this to an HTTP cert auth protocol?
>> 
>> Yes, yes it would.  A better authentication mechanism might be better 
>> still.  But that would be a new protocol.  We have plenty of evidence 
>> to suggest that a new protocol would not be acceptable.  As I said, we 
>> are already at plan B.
> 
> An HTTP cert auth protocol is just an HTTP authentication method, much like Basic, Digest or the experimental ones we’re standardizing in http-auth. The framework is already there in all clients and servers.  It has the advantage that you don’t have to skip between protocol layers - it’s all in HTTP. This way the client is in control of which streams are authenticated and which are not, so Imari’s security hole could go away. 
> 
> Practically you probably don’t want to sign each request, so applications are likely to set a cookie (or tokbind) after a single authentication and use that to continue the authentication to other resources, but that’s the way they do it with other forms of authentication anyway.
> 
> Yoav
> 
> 
>